Smart Homes Cyberthreats Identification Based on Interactive Training

Size: px
Start display at page:

Download "Smart Homes Cyberthreats Identification Based on Interactive Training"

Transcription

1 Smart Homes Cyberthreats Identification Based on Interactive Training Zlatogor Minchev 1, Luben Boyanov 2 Institute of Information and Communication Technologies, Bulgarian Academy of Sciences Acad. Georgi Bonchev Str., Bl. 25A, zlatogor@bas.bg 1, lb@acad.bg 2 Abstract. The paper briefly describes cyber threats identification framework in a smart home test bed environment. A problem space is initially built, through a q-based survey of potential cyber threats sources. Further on, an expert based reference with morphological and system modelling and analysis of this space is performed via a specialized software environment I-SCIP-MA-SA. The validation is organized through an interactive human-machine agent based constructive simulation. Selected users and environment characteristics are monitored for the proposed identified threats validation. This assures an explanatory cyber threats identification combined with real test bed experiments through interactive training. Key words. cyber threats, smart homes, morphological and system analysis, agent based simulation, constructive simulation, interactive training. 1. Introduction Today smart homes are becoming an indispensible modern part of our everyday live. This concept has gone through a significant evolution for almost a century and nowadays is addressing telemedicine, security and emergency areas, green energy and emerging technologies. This is also a result of the current fast ICT progress and opens a number of threats for the technologies development perspectives and their users response. The modern IT world is a place where the interactiveness between technologies and humans is constantly evolving, mixing physical and digital realities. Humans are becoming more and more significant, with special attention paid to the behaviour dynamics and ambient factors influence. This could be a useful information source in the analysis of cyber threats for smart homes. The paper briefly considers a methodological framework for identifying cyber threats on the basis of experts believes, filtered with morphological and system analysis. The results are further experimentally validated in a test bed environment for a selected scenario sets. The process is organized around a multi-agent constructive simulation concept with humanin-the-loop participation. During this, the activities of the test bed inhabitants (smart homes users) and environment conditions are monitored for experimental correlation of selected scenarios sets. This useful combination is producing a promising base for empirical validation of experts believes through interactive training and constructive simulation. Further on, the paper gives a more detailed description of the proposed idea. 2. Methodological Framework Generally, the methodological framework for cyber threats identification (see Figure 1) encompasses the application of the scenario method combined with analysis and

2 validation. Both implementing experts believes and real human-in-the-loop monitored participation through agent based constructive simulation. Figure 1. General schematic representation of the methodological framework. The methodological framework, presented on Figure 1 could be practically implemented for smart homes cyber threats identification in four stages: (i) cyber threats identification, (ii) context definition, (iii) analysis and (iv) validation [11]. The next section gives more details of this four stages practical implementation. 3. Practical Implementation Cyber threats identification was performed collecting users focus group data gathered from two q-based surveys. The first survey concerned Web technologies trends for a five years time horizon and expected cyber threats in several social facets (Civil Society, Banks and Finances, State Governance, Critical Infrastructure, Emerging Technologies, Education). A focus group of 150 participants (national and international experts) has been studied [11]. The second survey results were produced from 250 participants focus group at the University of National & World Economy Sofia, The College of Tele and Post and VISENSI Ltd. The obtained trends were covering: Type of used smart devices ; Activities for using smart devices ; Positives of using smart devices with Internet access ; Negatives of using smart devices with Internet access ; Type of information exchanged via smart devices ; Smart devices influence to everyday life. A generalization of the obtained results from both surveys is presented in Figure 2 and Figure 3.

3 Figure 2. Q-based survey results about Web technologies trends amongst 150 participants. Figure 3. Q-based survey generalized results of smart devices amongst 250 participants. The notations from Figure 2 [11] are using a discrete five-level color scale from green to red trough yellow that shows an increasing influence towards red and a decreasing one towards green. The blue color is noting uncertainty. Similarly to another recent EU study, the selected time horizon was five years [1]. Briefly, the resulting trends are marking cyber risks and threats importance increase in all Web 1.0/Web 5.0 technological areas. A visible exception of the part concerning Web

4 4.0/Web 5.0 (for Banks and Finances and Emerging Technologies facets) is quite understandable as these new technologies are expected to be available in at least ten-year time horizon. The generalized results from Figure 3 demonstrate that most of studied the users are relying on Smartphones (70%) and Laptops (80%) for Communication (90%) and Entertainment (30%). A few of them are using smart devices for House hold support (30%), including: automated washing machines, drying machines, cleaning and cooking robots, dishwashers. Only 10 % from the users are having Smart TVs and Gamming consoles. According to the studied users focus group, the positives of smart devices usage are related to: Communication facilitation (70%) and Time saving (40%). The creation of New contacts is 30% of the users priorities. The negatives are given to Overweight (80%) and Stress (20%). Mobile smart devices are most often used for text messages exchange (70%) and multimedia (20%). Currently the influence of smart devices influence to our everyday lives is classified as Moderate (80%) up to High (60%). The percentages sum is over a hundred, as the participants were allowed to give more than one answer. Context definition is the second stage following cyber threats identification. Graphically, it is summarized in Figure 4: Figure 4. Graphical interpretation of the context definition process. The identified cyber threats are arranged in accordance with their importance using experts opinion. The results are implemented as driving factors [13] for the morphological and system analysis during scenarios preparation (see next stage). A good comprehensive example is the recent SysSec consortium study [7]. The authors mark three basic directions: mobile devices, social networks, critical infrastructure. A classification regarding smart homes environment, presented in Table 1 was proposed by the authors [2].

5 SMART HOME SERVICES POSSIBLE THREATS CRITICAL ATTACK POINTS POSSIBLE CONSEQUENCES FROM THE ATTACK Health care Do not take medicine, pacemaker malfunctioning, etc. Critical Care for children or people with disabilities Requires attention Critical Security and safety Intrusion Critical Care for children or people with disabilities Requires attention Critical Home environment Fire, flooding, gas leakage Critical Smart home appliance Does not turn off, turns on/off at wrong time integrating system Non-critical, but dangerous Privacy Violation of privacy, data gathering Video surveillance, Non-critical but dangerous Entertainment and pleasure Malfunctioning of the pleasure, comfort and entertainment systems Sensors, communication system, integrating system Non-critical Table 1. Services, dangers, attack points and consequences in smart homes. The results from Table1 are practically used during the analysis and validation methodological stage. The Analysis is performed in four sub stages. As far as the scenario method has been selected for methodological base, morphological and system analyses are initially performed.

6 Generally, these processes are relying on experts data with a lot of combinations and uncertainties, so some software support with I-SCIP-MA-SA [8] is also implemented. The key idea for machine interpretation of the problem space is the E-R paradigm [3] graphically represented with named round rectangles (Entities) and weighted headed arrows (Relations). Morphological analysis A resulting problem space for smart homes cyber threats scenarios exploration through morphological analysis with 16 alternatives spread in 5 dimensions [9] is shown on Figure 5. The dimensions are presented in different colors. Figure 5. A screen shot of I-SCIP-MA for morphological scenario problem space with 16 alternatives and 5 dimensions, studying smart homes cyber threats. The resulting cross-consistency matrix contains N = 1620 (N = 5 x 3 x 4 x 3 x 3 x 3) scenario combinations (see Figure 6). It is important to note here, that the implemented scale for weighting the arrows gives the percentage measure, covering three levels: weak [0-30%], moderate [30-50%], high [50-10%] from the interval [0, 1]. The Dimensions part is encompassing the following: Devices, Activities, Communication Medium, Environment Characteristics, Human Factor Characteristics. Each dimension contains different number of alternatives that in practice are subspaces, e.g. Devices encompasses: Mobile Smart Devices, Home Entertainment Systems and Home Automation Systems. A ranking, using Relative Common Weight (RCW) has been performed. RCW sums the unidirectional relations weights (noted with yellow labels above the relations) connecting an alternative from each of the five dimensions that were used. The final results are scenarios with negative or positive RCW in accordance with obvious or hidden cyber threats identification. The most interesting scenario combinations in our morphological analysis were: Scenario 3 (RCW = 265, encompassing: Home Entertainment Systems Entertainment Cable Networks Structural environment characteristics Spacial human factor characteristics); Scenario 9 (RCW = 210, encompassing: Mobile Smart Devices Communication Wireless Networks Physical environment characteristics Bioelectric human factor characteristics) and Scenario 19 (RCW = 110, encompassing:

7 Mobile Smart Devices Everyday Work Wireless Networks Functional environment characteristics Bioelectric human factor characteristics). Figure 6. A screen shot from I-SCIP-MA of morphological cross-consistency matrix with N = 1620 scenario combinations for smart homes cyber threats exploration. These results do not give any concrete cyber threats identification scenarios but just outline, in accordance with the experts believes, the importance of the activities Entertainment, Communication and Everyday Work together with the human factor Spacial and Bioelectric characteristics in smart home environment. System Analysis Generally, the system analysis for a smart home is a complex dynamic system approximation. The system model for smart homes could be both static [2] and dynamic. Whilst, the static one gives general classification of the objects of interest, the dynamic is quite useful in the Validation process. It is important to note that the E-R paradigm is used implementing weights (with similar to the morphological analysis scale) and time of the bidirectional relations (both noted, consecutively with labels in yellow and blue). Additionally, a three dimensional Sensitivity Diagram (SD) presenting influence (x), dependence, (y) and sensitivity (z). Four sectors encompassing the entities classification are utilized: green (buffering), red (active), blue (passive) and yellow (critical). All entities from the model are visualized in SD with indexed balls. Practical illustration of a static smart home general system model and a resulting SD classification are given in Figure 7.

8 Figure 7. A smart home system model (left) and resulting SD diagram (right) after [2]. The resulting SD from Figure 7 gives a profitable classification for further analysis, outlining the Human Factor (indexed ball/sphere 2 with coordinates {x=70, y=65, z=5}) as a critical entity together with the potential hidden cyber threats passive entities: Devices (indexed ball 5 with coordinates {x=20, y=55, z = -35}), Activities (indexed ball 3 with coordinates {x=30, y=65, z= -35}) and real active one: Communication Medium (indexed ball 1 with coordinates {x=80, y=20, z=60}). Further Validation was performed trying to obtain more comprehensive evidence for this experts believes and analyses results. Validation This final stage of the presented methodological framework is related to interactive training and includes agent-based modeling and simulation. The presented multi-agent model, implemented in I-SCIP-SA dynamic environment (see Figure 8) is encompassing seven key role agents: Real Human Agent, Entertaining Agent, Comms Agent, Storing Agent, Monitoring Agent, Digital Assistant, Attack Agent. Generally these roles cover a number of devices, protocols and parameters. What is important to note here is the capability for connecting real devices with simulated ones, i.e. mixing the virtual and real world. Additionally, Figure 8 illustrates the initial believs evolution, starting from green and progressing towards different SD sectors in accordance with model relations weights dynamics. As the human factor in this dynamic model (noted with indexed 2 sphere) is classified as a passive one (blue sector of SD on Figure 8) a more detailed analisys could be performed trough a test bed interactive environment. For this purpose, a smart home test bed environment (see Figure 9) has been organized in the framework of DFNI T01/4 project at the Institute of Information and Communication Technologies (IICT), Bulgarian Academy of Sciences BAS. The test bed environment is positioned in a room equipped with a number of smart devices, including: 3D TV/monitors, X-box game console, entertainment and cleaning robots, programmed tablet remote control and IP video omnidirectional monitoring system. An ad-hoc created digital assistant - Alex, provides voice control for lighting, multimedia and heating with holo-like projection avatar. In addition, an environment embedded Xbee sensor barometer system and wearable human factor bio headband are being developed [4]. The sensor barometer system is also capable to monitor CO/CO2 concentration measurement, radiation, electromagnetic fields and dust particles [5].

9 Figure 8. Basic multi-agent system model representation with 5 steps dynamics. The human factor activities are monitored via EEG Nation 7128W C20, bio headband for ECG and body temperature monitoring [4]. All data from sensors and video behavior monitoring is stored in a data base. Figure 9. Moments of smart home test bed validation usage at IICT-BAS.

10 The above described test bed has been organized for practical agent-based interactive training. Some interesting results have been recently published [12] concerning the human factor hidden threats related to EEG dynamics in 2D and 3D visual environment and the gamming process in social networks. The results directly accentuate the necessity of comprehensive study of cyber threats problem in smart homes and the emerging digital drugs [6]. We are planning further improvement of the validation process with other users behavioural modalities. The results will be evaluated via multicriteria analysis and balanced score card [10]. Discussion The progress in smart homes technologies is opening a number of cyber threats to their users today. Whilst some of them are quite obvious, other related to entertainment, privacy and appliances are hiding a lot of unexplored domains. Examples for such new cyber threat areas are the digital drugs (addiction to technologies) and social engineering that are important for the future generations of inhabitants (users) of smart homes. A suitable framework approach for studying these problems is the combination of experts believes data, analysis, modelling, inhabitants and environment monitoring, as well as, practical validation through real constructive experimental training. Acknowledgement The results in this publication are financially supported by: A Feasibility Study on Cyber Threats Identification and their Relationship with Users Behavioural Dynamics in Future Smart Homes, Research Grant Funding of Fundamental & Applied Scientific Research in Priority Fields, Bulgarian Science Fund, Ministry of Education Youth and Science, , DFNI-Т01/4, A special gratitude for the threats identification methodology is also given to: EU Network of Excellence in Managing Threats and Vulnerabilities for the Future Internet SysSec, FP7 Grant Agreement No , , References 1. Balzarotti, D. Second Report on Threats on the Future Internet and Research Roadmap, SysSec Consortium Deliverable D4.2, September, 2012, [Online] 2. Boyanov, L., Minchev, Z. Cyber security Challenges in Smart Homes, In Proceedings of NATO ARW Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework, Ohrid, Macedonia, June 10-12, 2013 (in press) 3. Chen, P. The Entity-Relationship Model-Toward a Unified View of Data, ACM Transactions on Database Systems, 1, no.1, 9 36, Georgiev, S., Minchev, Z. An Evolutionary Prototyping for Smart Home Inhabitants Wearable Biomonitoring, In Proceedings of Conjoint Scientific Seminar Modelling & Control of Information Processes, IMI-BAS, 21 31,`November 19, Georgiev, S., Kolev, H., Obreshkov, N., Lalev, E. Security System for Future Smart Homes, In Proceedings of National conference with international participation in realization of the EU project Development of Tools Needed to Coordinate Inter-sectorial Power and Transport CIP Activities at a Situation of Multilateral Terrorist Threat. Increase of the Capacity of Key CIP Objects in Bulgaria, at Grand Hotel Sofia, Sofia city, Bulgaria, June 4, , 2013 (in Bulgarian).

11 6. Guma, G. Messing with Our Minds: Psychiatric Drugs, Cyberspace and Digital Indoctrination, Global Research, November 11, 2013, [Online] 7. Markatos, E., and Balzarotti, D. (Eds) The Red Book. The SysSec Roadmap for Systems Security Research, The SysSec Consortium, 2013, [Online] 8. Minchev, Z., Shalamanov, V., Scenario Generation and Assessment Framework Solution in Support of the Comprehensive Approach, In Proceedings of SAS-081 Symposium on Analytical Support to Defence Transformation, RTO-MP-SAS-081, Sofia, Boyana, April 26 28, , 2010, MINCHEV-SHALAMANOV.pdf [Online] 9. Minchev, Z., Boyanov, L., & Georgiev, S. Security of Future Smart Homes. Cyber-Physical Threats Identification Perspectives, In Proceedings of National conference with international participation in realization of the EU project 'Development of Tools Needed to Coordinate Inter-sectorial Power and Transport CIP Activities at a Situation of Multilateral Terrorist Threat. Increase of the Capacity of Key CIP Objects in Bulgaria', Grand Hotel 'Sofia', Sofia, Bulgaria, , June 4, Minchev et al., Joint Training Simulation and Analysis Center, Technical Report, Institute for Parallel Processing, Bulgarian Academy of Sciences, 2009, [Online]. 11. Minchev, Z. Security of Digital Society. Technological Perspectives and Challenges, In Proceedings of Jubilee International Scientific Conference Ten Years Security Education in New Bulgarian University: Position and Perspectives for the Education in a Dynamic and Hardly Predicted Environment Sofia, Planeta -3 Publishing House, , 2013 (in Bulgarian) 12. Minchev, Z. 2D vs 3D Visualization & Social Networks Entertainment Games. A Human Factor Response Case Study, In Proceedings of 12th International Conference, ICEC 2013, São Paulo, Brazil, October 16-18, 2013 (Editors: Junia C. Anacleto, Esteban W. G. Clua, Flavio S. Correa da Silva, Sidney Fels, Hyun S. Yang), Lecture Notes in Computer Science, vol. 8215, , 2013b. 13. Schwartz, P. The Art of the Long View: Planning for the Future in an Uncertain World, Doubleday Currency, New York, 1991.

INFORMATION PROCESSES AND THREATS IN SOCIAL NETWORKS. A CASE STUDY. Bulgarian Academy of Sciences zlatogor@bas.bg, mg@acad.bg

INFORMATION PROCESSES AND THREATS IN SOCIAL NETWORKS. A CASE STUDY. Bulgarian Academy of Sciences zlatogor@bas.bg, mg@acad.bg INFORMATION PROCESSES AND THREATS IN SOCIAL NETWORKS. A CASE STUDY. Zlatogor Minchev 1,2, Maria Petkova 1 1 Institute of Information and Communication Technologies 2 Institute of Mathematics and Informatics

More information

Cyber threats optimization for e-government services

Cyber threats optimization for e-government services Cyber threats optimization for e-government services Veselin Politov, Zlatogor Minchev, Pablo Crotti, Doychin Boyadzhiev, Marusia Bojkova, Plamen Mateev Problem Definition A discrete model of e-government

More information

The Great Complexity of the World Around Us

The Great Complexity of the World Around Us Sofia, Bulgaria University of National & World Economy, NRS Department March 22, 2012 The Great Complexity of the World Around Us Building Context The Scenario Method Some Practical Examples Selected References

More information

Business Intelligence Systems for Analyzing University Students Data

Business Intelligence Systems for Analyzing University Students Data BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 1 Sofia 2015 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2015-0009 Business Intelligence Systems

More information

Summer projects for Dept. of IT students in the summer 2015

Summer projects for Dept. of IT students in the summer 2015 Summer projects for Dept. of IT students in the summer 2015 Here are 7 possible summer project topics for students. If you are interested in any of them, contact the person associated with the project

More information

Communication and Embedded Systems: Towards a Smart Grid. Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar

Communication and Embedded Systems: Towards a Smart Grid. Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar Communication and Embedded Systems: Towards a Smart Grid Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar Alex Sprintson Smart grid communication Key enabling technology Collecting data Control

More information

ARCHITECTURE DESIGN OF SECURITY SYSTEM

ARCHITECTURE DESIGN OF SECURITY SYSTEM Trakia Journal of Sciences, Vol. 8, No. 3, pp 77-82, 2010 Copyright 2009 Trakia University Available online at: http://www.uni-sz.bg ISSN 1313-7050 (print) ISSN 1313-3551 (online) Review ARCHITECTURE DESIGN

More information

Concept and Project Objectives

Concept and Project Objectives 3.1 Publishable summary Concept and Project Objectives Proactive and dynamic QoS management, network intrusion detection and early detection of network congestion problems among other applications in the

More information

Chapter 4. The sleep and activities of daily living (ADL) monitoring application

Chapter 4. The sleep and activities of daily living (ADL) monitoring application Authors: Yuchen-Huang (2014-07-30); recommended: Yeh-Liang Hsu(2014-08-01). Chapter 4. The sleep and activities of daily living (ADL) monitoring application Long-term ADL profiles of the older adults acquired

More information

Connected Intelligence and the 21 st Century Digital Enterprise

Connected Intelligence and the 21 st Century Digital Enterprise Connected Intelligence and the 21 st Century Digital Enterprise Lewis Carr Senior Director, HP Software May 25 th, 2015 By 2025 we will become a deeply connected, digital world Digital everything everywhere,

More information

Now and Tomorrow. IEEE/AICCSA Conference November 2014 Malike Bouaoud Cyber Security Advisor

Now and Tomorrow. IEEE/AICCSA Conference November 2014 Malike Bouaoud Cyber Security Advisor Now and Tomorrow IEEE/AICCSA Conference November 2014 Malike Bouaoud Cyber Security Advisor Hacktivism Regulatory/Compliance (local and international) Sophisticated Malware Data leakage Cybercriminal syndicates

More information

How an existing telecommunications network can support the deployment of smart meters in a water utility?

How an existing telecommunications network can support the deployment of smart meters in a water utility? How an existing telecommunications network can support the deployment of smart meters in a water utility? Samuel de Barros Moraes Centro Paula Souza São Paulo Brazil samuel.moraes@ngdc.com.br Profª Drª

More information

Professor, D.Sc. (Tech.) Eugene Kovshov MSTU «STANKIN», Moscow, Russia

Professor, D.Sc. (Tech.) Eugene Kovshov MSTU «STANKIN», Moscow, Russia Professor, D.Sc. (Tech.) Eugene Kovshov MSTU «STANKIN», Moscow, Russia As of today, the issue of Big Data processing is still of high importance. Data flow is increasingly growing. Processing methods

More information

Towards an On board Personal Data Mining Framework For P4 Medicine

Towards an On board Personal Data Mining Framework For P4 Medicine Towards an On board Personal Data Mining Framework For P4 Medicine Dr. Mohamed Boukhebouze Deputy Department Manager, CETIC European Data Forum 2015, November 16 17 Luxembourg Centre d Excellence en Technologiesde

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION

APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION 18-19 September 2014, BULGARIA 137 Proceedings of the International Conference on Information Technologies (InfoTech-2014) 18-19 September 2014, Bulgaria APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK

More information

SMART HOME A DEFINITION

SMART HOME A DEFINITION Housing LIN intro factsheet SMART HOME A DEFINITION Introduction and acknowledgements The concept of Smart Homes plays an important role in the planning of future housing-based models of care. Smart Homes

More information

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management

More information

The Internet of the future: What could it be and what are the challenges

The Internet of the future: What could it be and what are the challenges The Internet of the future: What could it be and what are the challenges Daniel Kofman Prof. at Telecom ParisTech CTO RAD Data Communications 1st Japan EU Symposium on the "New Generation Network" and

More information

ICT Perspectives on Big Data: Well Sorted Materials

ICT Perspectives on Big Data: Well Sorted Materials ICT Perspectives on Big Data: Well Sorted Materials 3 March 2015 Contents Introduction 1 Dendrogram 2 Tree Map 3 Heat Map 4 Raw Group Data 5 For an online, interactive version of the visualisations in

More information

The Internet of Things (IoT) Opportunities and Risks

The Internet of Things (IoT) Opportunities and Risks Session No. 744 The Internet of Things (IoT) Opportunities and Risks David Loomis, CSP Risk Specialist Chubb Group of Insurance Companies Brian Wohnsiedler, CSP Risk Specialist Chubb Group of Insurance

More information

The Internet of Things From a User Perspective: Enhancing user experience in networks with multiple devices

The Internet of Things From a User Perspective: Enhancing user experience in networks with multiple devices The Internet of Things From a User Perspective: Enhancing user experience in networks with multiple devices Helena Holmström Olsson Malmö University Helena Holmström Olsson About me: Professor, Computer

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

CYBER SECURITY. Novel Approaches for Security in Building Automation Systems. J. Kaur, C. Herdin, J. Tonejc, S. Wendzel, M. Meier, and S.

CYBER SECURITY. Novel Approaches for Security in Building Automation Systems. J. Kaur, C. Herdin, J. Tonejc, S. Wendzel, M. Meier, and S. Novel Approaches for Security in Building Automation Systems J. Kaur, C. Herdin, J. Tonejc, S. Wendzel, M. Meier, and S. Szlósarczyk jaspreet.kaur@fkie.fraunhofer.de CYBER SECURITY Outline n Building Automation

More information

Innovation value pools for Utilities or Advanced Information and Communications (ICT) Technology in Energy

Innovation value pools for Utilities or Advanced Information and Communications (ICT) Technology in Energy Innovation value pools for Utilities or Advanced Information and Communications (ICT) Technology in Energy Tony Court Director, Cisco Consulting Services Oct 2014 3 R s for Utility Success in 21 st Century

More information

Smart Home and the Aging User - Trends and Analyses of Consumer Behavior Dr. Sibylle Meyer & Dr. Eva Schulze Berlin Institute for Social Research

Smart Home and the Aging User - Trends and Analyses of Consumer Behavior Dr. Sibylle Meyer & Dr. Eva Schulze Berlin Institute for Social Research Smart Home and the Aging User - Trends and Analyses of Consumer Behavior Dr. Sibylle Meyer & Dr. Eva Schulze Berlin Institute for Social Research Symposium Domotics and Networking, Miami, 11/19-12/02 1

More information

MICROCONTROLLER BASED SMART HOME WITH SECURITY USING GSM TECHNOLOGY

MICROCONTROLLER BASED SMART HOME WITH SECURITY USING GSM TECHNOLOGY MICROCONTROLLER BASED SMART HOME WITH SECURITY USING GSM TECHNOLOGY F. Shawki 1,2, M. El-Shahat. Dessouki 1,3, A. I. Elbasiouny 4, A.N. Almazroui 5, F. M. R. Albeladi 5 1 Assistant Professor, Electrical

More information

INTRODUCTION. IoT AND IP STRATEGIES

INTRODUCTION. IoT AND IP STRATEGIES INTRODUCTION At first, the Internet of Things (IoT) may seem like an idea straight out of science fiction. However, on closer consideration, we realize that the process of connecting everyday electronic

More information

How To Protect Your Network From Attack

How To Protect Your Network From Attack NextGen SCADA security Erwin Kooi Setting the stage This talk is not An introduction to SCADA security AIC versus CIA The latest blinky-lights SCADA security appliance How to use IT security in OT envrionments

More information

Sanjeev Kumar. contribute

Sanjeev Kumar. contribute RESEARCH ISSUES IN DATAA MINING Sanjeev Kumar I.A.S.R.I., Library Avenue, Pusa, New Delhi-110012 sanjeevk@iasri.res.in 1. Introduction The field of data mining and knowledgee discovery is emerging as a

More information

Methods for Assessing Vulnerability of Critical Infrastructure

Methods for Assessing Vulnerability of Critical Infrastructure March 2010 Methods for Assessing Vulnerability of Critical Infrastructure Project Leads Eric Solano, PhD, PE, RTI International Statement of Problem Several events in the recent past, including the attacks

More information

Sophos XG Firewall v 15.01.0 Release Notes. Sophos XG Firewall Reports Guide v15.01.0

Sophos XG Firewall v 15.01.0 Release Notes. Sophos XG Firewall Reports Guide v15.01.0 Sophos XG Firewall v 15.01.0 Release Notes Sophos XG Firewall Reports Guide v15.01.0 For Sophos and Cyberoam Customers Document Date: November 2015 Contents 2 Contents Reports... 4 Basics...4 Reports Navigation...

More information

How To Understand The Power Of The Internet Of Things

How To Understand The Power Of The Internet Of Things Next Internet Evolution: Getting Big Data insights from the Internet of Things Internet of things are fast becoming broadly accepted in the world of computing and they should be. Advances in Cloud computing,

More information

SEACW DELIVERABLE D.1.6

SEACW DELIVERABLE D.1.6 SEACW DELIVERABLE D.1.6 Validation Methodology Specifications Project Acronym SEACW Grant Agreement No. 325146 Project Title Deliverable Reference Number Deliverable Title Social Ecosystem for Antiaging,

More information

Cyberspace Situational Awarness in National Security System

Cyberspace Situational Awarness in National Security System Cyberspace Situational Awarness in National Security System Rafał Piotrowski, Joanna Sliwa, Military Communication Institute C4I Systems Department Zegrze, Poland, r.piotrowski@wil.waw.pl, j.sliwa@wil.waw.pl

More information

Implementing Deep-Secure guards in NATO Information Exchange Gateways

Implementing Deep-Secure guards in NATO Information Exchange Gateways Briefing Paper Implementing Deep-Secure guards in NATO Information Exchange Gateways March 2014 NATO Information Exchange Gateways An Information Exchange Gateway (IEG) is a system designed to enable the

More information

European Network for Cyber Security

European Network for Cyber Security European Network for Cyber Security Cyber Security: a fundamental basis for Smart Grids Project Summary December 19, 2014 Introduction Smart grids are crucial to support the use of more sustainable energy

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

Information Management course

Information Management course Università degli Studi di Milano Master Degree in Computer Science Information Management course Teacher: Alberto Ceselli Lecture 01 : 06/10/2015 Practical informations: Teacher: Alberto Ceselli (alberto.ceselli@unimi.it)

More information

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems GE Measurement & Control Top 10 Cyber Vulnerabilities for Control Systems GE Proprietary Information: This document contains proprietary information of the General Electric Company and may not be used

More information

2014 Voluntary Page and Overlength Article Charges

2014 Voluntary Page and Overlength Article Charges 2014 and NOTE: page charges do not apply to open access articles. Title Aerospace & Electronic $200 10 4 Aerospace & Electronic Affective Computing Annals of the History of Computing Antennas & Propagation

More information

VOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS. Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov, Kostadin Golev

VOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS. Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov, Kostadin Golev International Journal "Information Technologies and Knowledge" Vol.2 / 28 181 VOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov,

More information

EL Program: Smart Manufacturing Systems Design and Analysis

EL Program: Smart Manufacturing Systems Design and Analysis EL Program: Smart Manufacturing Systems Design and Analysis Program Manager: Dr. Sudarsan Rachuri Associate Program Manager: K C Morris Strategic Goal: Smart Manufacturing, Construction, and Cyber-Physical

More information

Cyber Security Incident Reporting Scheme

Cyber Security Incident Reporting Scheme OCIO/G4.12a ISMF Guideline 12a Cyber Security Incident Reporting Scheme BACKGROUND Reporting cyber security incidents is a source of intelligence information that assists in the development of a greater

More information

HPC Infrastructure Development in Bulgaria

HPC Infrastructure Development in Bulgaria HPC Infrastructure Development in Bulgaria Svetozar Margenov margenov@parallel.bas.bg Institute of Information and Communication Technologies, Bulgarian Academy of Sciences, Acad. G. Bonchev Str. Bl. 25-A,

More information

U.S. Army Research, Development and Engineering Command. Cyber Security CRA Overview

U.S. Army Research, Development and Engineering Command. Cyber Security CRA Overview U.S. Army Research, Development and Engineering Command Cyber Security CRA Overview Dr. Ananthram Swami, ST Network Science 18FEB 2014 Cyber Security Collaborative Research Alliance A Collaborative Venture

More information

WALL TABLET. Smart Home Controller. make your home smart. Control your home from anywhere in the world

WALL TABLET. Smart Home Controller. make your home smart. Control your home from anywhere in the world WALL TABLET W I T H WA L L C H A R G I N G S TAT I O N Smart Home Controller Control your home from anywhere in the world WALL TABLET Connect everything Makes every home safe, comfortable and energy efficient

More information

SCADA Security Training

SCADA Security Training SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,

More information

Affordable Building Automation System Enabled by the Internet of Things (IoT)

Affordable Building Automation System Enabled by the Internet of Things (IoT) Solution Blueprint Internet of Things (IoT) Affordable Building Automation System Enabled by the Internet of Things (IoT) HCL Technologies* uses an Intel-based intelligent gateway to deliver a powerful,

More information

1 Log visualization at CNES (Part II)

1 Log visualization at CNES (Part II) 1 Log visualization at CNES (Part II) 1.1 Background For almost 2 years now, CNES has set up a team dedicated to "log analysis". Its role is multiple: This team is responsible for analyzing the logs after

More information

A Cost-efficient Building Automation Security Testbed for Educational Purposes

A Cost-efficient Building Automation Security Testbed for Educational Purposes A Cost-efficient Building Automation Security Testbed for Educational Purposes Jaspreet Kaur, Michael Meier, Sebastian Szlósarczyk and Steffen Wendzel Cyber Security Department Fraunhofer Institute for

More information

A Short Introduction on Data Visualization. Guoning Chen

A Short Introduction on Data Visualization. Guoning Chen A Short Introduction on Data Visualization Guoning Chen Data is generated everywhere and everyday Age of Big Data Data in ever increasing sizes need an effective way to understand them History of Visualization

More information

Big Data and utility function in bank services. Nikolay K. Vitanov 1

Big Data and utility function in bank services. Nikolay K. Vitanov 1 Big Data and utility function in bank services Selected aspects Nikolay K. Vitanov 1 1 Institute of Mechanics, Bulgarian Academy of Sciences Sofia, 16. 06. 2015 Vitanov (BAS) Big Data and utility function

More information

Chapter 1 Basic Introduction to Computers. Discovering Computers 2012. Your Interactive Guide to the Digital World

Chapter 1 Basic Introduction to Computers. Discovering Computers 2012. Your Interactive Guide to the Digital World Chapter 1 Basic Introduction to Computers Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Explain why computer literacy is vital to success in today s world Define

More information

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and

More information

THE DEVELOPMENT OF A WEB BASED MULTIMEDIA INFORMATION SYSTEM FOR BUILDING APPRAISAL

THE DEVELOPMENT OF A WEB BASED MULTIMEDIA INFORMATION SYSTEM FOR BUILDING APPRAISAL THE DEVELOPMENT OF A WEB BASED MULTIMEDIA INFORMATION SYSTEM FOR BUILDING APPRAISAL Dominic O' Sullivan Department of Civil & Environmental Engineering National University of Ireland, Cork. Dr. Marcus

More information

Selbo 2 an Environment for Creating Electronic Content in Software Engineering

Selbo 2 an Environment for Creating Electronic Content in Software Engineering BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofia 2009 Selbo 2 an Environment for Creating Electronic Content in Software Engineering Damyan Mitev 1, Stanimir

More information

Wearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec

Wearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec Wearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec 3.58 KM 12.11 KPH 493 Calories 114 BPM WEARABLE TECH EVOLUTION AND SECURITY GRANT BROWN SECURITY STRATEGIST @thegrantbrown

More information

Security Visualization Past, Present, Future

Security Visualization Past, Present, Future Security Visualization Past, Present, Future Greg Conti West Point @cyberbgone http://dl.acm.org/citation.cfm?id=2671501 http://link.springer.com/chapter/10.1007%2f978-3-540-85933-8_11 http://images.cdn.stuff.tv/sites/stuff.tv/files/styles/big-image/public/25-best-hacker-movies-ever-the-matrix.jpg?itok=kiwtknw1

More information

Development of a Service Robot System for a Remote Child Monitoring Platform

Development of a Service Robot System for a Remote Child Monitoring Platform , pp.153-162 http://dx.doi.org/10.14257/ijsh.2014.8.5.14 Development of a Service Robot System for a Remote Child Monitoring Platform Taewoo Han 1 and Yong-Ho Seo 2, * 1 Department of Game and Multimedia,

More information

How To Protect The Railway From Attack

How To Protect The Railway From Attack FOCUS Security Research projects No 1 - November 2014 In its role as technical platform and forum for gathering and expressing members ideas, UIC is able to synthesise these research needs, along with

More information

Intrusion Detection via Machine Learning for SCADA System Protection

Intrusion Detection via Machine Learning for SCADA System Protection Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. s.l.yasakethu@surrey.ac.uk J. Jiang Department

More information

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD

CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD The 2011 2015 Cyber Security Strategy of the Czech Republic is linked to the Security Strategy of the Czech Republic and reflects

More information

The Internet of Things... Hype or not?

The Internet of Things... Hype or not? The Internet of Things... Hype or not? Filip De Maeyer Philip Leenders 2013 global revenues of USD 5.8 billion Client-centric, services-focused business 73% of Global Fortune 100 and 59% of Global Fortune

More information

Fostering Incident Response and Digital Forensics Research

Fostering Incident Response and Digital Forensics Research Fostering Incident Response and Digital Forensics Research Bruce J. Nikkel bruce.nikkel@ubs.com September 8, 2014 Abstract This article highlights different incident response topics with a focus on digital

More information

Information & Communication Security (SS 15)

Information & Communication Security (SS 15) Information & Communication Security (SS 15) Security Engineering Dr. Jetzabel Serna-Olvera @sernaolverajm Chair of Mobile Business & Multilateral Security Goethe University Frankfurt www.m-chair.de Introduction

More information

Considerations on Audience Measurement Procedures for Digital Signage Service

Considerations on Audience Measurement Procedures for Digital Signage Service Considerations on Audience Measurement Procedures for Digital Signage Service Wook Hyun, MiYoung Huh, SeungHei Kim and ShinGak Kang Electronics and Telecommunications Research Institute Daejeon, Republic

More information

NO 1 IN SMART HOUSE AND HIGH TECH BUILDING TECHNOLOGIES

NO 1 IN SMART HOUSE AND HIGH TECH BUILDING TECHNOLOGIES AKAM ARCHITECTS NO 1 IN SMART HOUSE AND HIGH TECH BUILDING TECHNOLOGIES SERIES OF CONFORT, SELF ESTEEM, HIGH CLASS, LUX What is a Smart House? The term smart house is used to describe a home that uses

More information

Available online at www.sciencedirect.com. ScienceDirect. Procedia CIRP 38 (2015 ) 3 7

Available online at www.sciencedirect.com. ScienceDirect. Procedia CIRP 38 (2015 ) 3 7 Available online at www.sciencedirect.com ScienceDirect Procedia CIRP 38 (2015 ) 3 7 The Fourth International Conference on Through-life Engineering Services Industrial big data analytics and cyber-physical

More information

Enhanced Humans in Smart Cities: building e- skills for everyday life

Enhanced Humans in Smart Cities: building e- skills for everyday life Enhanced Humans in Smart Cities: building e- skills for everyday life Adel Ben Youssef (University of Nice Sophia- An6polis GREDEG- CNRS) Séminaire de l axe 4: Territoires, Systèmes techniques et usages

More information

Information Visualization WS 2013/14 11 Visual Analytics

Information Visualization WS 2013/14 11 Visual Analytics 1 11.1 Definitions and Motivation Lot of research and papers in this emerging field: Visual Analytics: Scope and Challenges of Keim et al. Illuminating the path of Thomas and Cook 2 11.1 Definitions and

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014 RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer

More information

Ontology for Home Energy Management Domain

Ontology for Home Energy Management Domain Ontology for Home Energy Management Domain Nazaraf Shah 1,, Kuo-Ming Chao 1, 1 Faculty of Engineering and Computing Coventry University, Coventry, UK {nazaraf.shah, k.chao}@coventry.ac.uk Abstract. This

More information

Wireless Remote Monitoring System for ASTHMA Attack Detection and Classification

Wireless Remote Monitoring System for ASTHMA Attack Detection and Classification Department of Telecommunication Engineering Hijjawi Faculty for Engineering Technology Yarmouk University Wireless Remote Monitoring System for ASTHMA Attack Detection and Classification Prepared by Orobh

More information

Terms of Reference for the Review of the OECD Guidelines for the Security of Information Systems and Networks

Terms of Reference for the Review of the OECD Guidelines for the Security of Information Systems and Networks Please cite this paper as: OECD (2012), Terms of Reference for the Review of the OECD Guidelines for the Security of Information Systems and Networks, OECD Digital Economy Papers, No. 210, OECD Publishing.

More information

Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com

Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com Internet of Things (IoT): Security Awareness Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com So What is the Internet of Things Network of physical objects embedded with: Electronics, software, sensors

More information

Good morning. It is a pleasure to be with you here today to talk about the value and promise of Big Data.

Good morning. It is a pleasure to be with you here today to talk about the value and promise of Big Data. Good morning. It is a pleasure to be with you here today to talk about the value and promise of Big Data. 1 Advances in information technologies are transforming the fabric of our society and data represent

More information

Social Innovation through Utilization of Big Data

Social Innovation through Utilization of Big Data Social Innovation through Utilization of Big Data Hitachi Review Vol. 62 (2013), No. 7 384 Shuntaro Hitomi Keiro Muro OVERVIEW: The analysis and utilization of large amounts of actual operational data

More information

CAPABILITY FOR DEFENCE IN TURKEY

CAPABILITY FOR DEFENCE IN TURKEY NETWORK ENABLED CAPABILITY FOR DEFENCE IN TURKEY Mr. Mete ARSLAN, marslan@ssm.gov.tr Presentation Plan Introduction of SSM SSM point of view for NEC concept and National motivation NEC Technical Feasibility

More information

Defense Technical Information Center Compilation Part Notice

Defense Technical Information Center Compilation Part Notice UNCLASSIFIED Defense Technical Information Center Compilation Part Notice ADP012353 TITLE: Advanced 3D Visualization Web Technology and its Use in Military and Intelligence Applications DISTRIBUTION: Approved

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

PoNET kbd48cnc. User s manual

PoNET kbd48cnc. User s manual PoNET kbd48cnc User s manual Version: 16/10/2012 SAFETY INFORMATION! This product is intended for integration by the user into a computer numerical control (CNC) machine. It is the user's responsibility

More information

System integration oriented data center. planning. In terms of ATEN's eco Sensors DCIM solution

System integration oriented data center. planning. In terms of ATEN's eco Sensors DCIM solution System integration oriented data center planning In terms of ATEN's eco Sensors DCIM solution 1. Introduction The reliability of an enterprise data center servicing either external or internal clients

More information

Cyber Security Design Methodology for Nuclear Power Control & Protection Systems. By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC)

Cyber Security Design Methodology for Nuclear Power Control & Protection Systems. By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC) Cyber Security Design Methodology for Nuclear Power Control & Protection Systems By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC) 1. INTRODUCTION In today s world, cyber security is one

More information

Governance van Mobiele Service Platforms

Governance van Mobiele Service Platforms Governance van Mobiele Service Platforms Trends en ontwikkelingen Dr. ir. Mark de Reuver Section Information and Communication Technology Faculty Technology Policy and Management Delft University of Technology

More information

Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010

Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010 1 Modern security environment contains a broad and evolving set of challenges to the security of NATO s territory and populations. In order to assure their security, the Alliance must and will continue

More information

Annex 5. Training needs analysis of trainers and teachers from the vocational education sector

Annex 5. Training needs analysis of trainers and teachers from the vocational education sector Annex 5 Training needs analysis of trainers and teachers from the vocational education sector Introduction In order to apply the adapted model for training trainers and teachers working in the vocational

More information

Distributing Interaction in Responsive Cross-Device Applications

Distributing Interaction in Responsive Cross-Device Applications Distributing Interaction in Responsive Cross-Device Applications Félix Albertos-Marco, Víctor M.R. Penichet, and José A. Gallud University of Castilla-La Mancha, Computer System Department Albacete, Spain

More information

ICT SECURITY SECURE ICT SYSTEMS OF THE FUTURE

ICT SECURITY SECURE ICT SYSTEMS OF THE FUTURE OVERVIEW Critial infrastructures are increasingly dependent on information and communication technology. ICT-systems are getting more and more complex, and to enable the implementation of secure applications

More information

Internet of Things: IoT Day Special Edition

Internet of Things: IoT Day Special Edition Table of Contents Executive Summary..1 Introduction...2 Stack Layers in Internet of Things...4 Trends..5 Assignee-wise technology distribution. 8 Appendix...9 Executive Summary Internet of Things (IoT)

More information

Computer Concepts And Applications CIS-107-TE. TECEP Test Description

Computer Concepts And Applications CIS-107-TE. TECEP Test Description Computer Concepts And Applications CIS-107-TE This TECEP tests content covered in a one-semester course in computer concepts and applications. It focuses on an overview of computers, including historical

More information

The Scientific Data Mining Process

The Scientific Data Mining Process Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In

More information

Thales Communications Perspectives to the Future Internet 2 nd June 2010 - Luxembourg

Thales Communications Perspectives to the Future Internet 2 nd June 2010 - Luxembourg Thales Communications Perspectives to the Future Internet 2 nd June 2010 - Luxembourg Challenges of Future Internet Internet as a starting point Was defined for asynchronous services (web pages, file transfer

More information

Long Term Research Agenda

Long Term Research Agenda Long Term Research Agenda Abstract This report is part of the CIRENE project that aims the definition future work including FP7 project proposal, research topics for MSc and PhD students, and the possibilities

More information

ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION

ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION Arto Hämäläinen and Jari Porras Lappeenranta University of Technology Laboratory of Communications Engineering P.O. Box 20 53851

More information

Course Overview and Outline

Course Overview and Outline Course Overview and Outline The My Digital Life curriculum is comprised of seven modules that cover key concepts for building digital literacy. Each module contains between three and nine brief activities

More information

Android Application for Accessing KNX Devices via IP Connection

Android Application for Accessing KNX Devices via IP Connection Android Application for Accessing KNX Devices via IP Connection J. A. Nazabal, J. Gómez, F. Falcone, C. Fernández-Valdivielso, P. E. Branchi and I. R. Matías Electrical and Electronic Engineering Department,

More information

Fuzzy Cognitive Map for Software Testing Using Artificial Intelligence Techniques

Fuzzy Cognitive Map for Software Testing Using Artificial Intelligence Techniques Fuzzy ognitive Map for Software Testing Using Artificial Intelligence Techniques Deane Larkman 1, Masoud Mohammadian 1, Bala Balachandran 1, Ric Jentzsch 2 1 Faculty of Information Science and Engineering,

More information

Information Systems and Electronic Communications in Logistics Management

Information Systems and Electronic Communications in Logistics Management Information Systems and Electronic Communications in Logistics Management Ephrem Eyob, Virginia State University, Petersburg, VA 23806 eeyob@vsu.edu ABSTRACT Telecommunications and Networking Technologies

More information

Development of Information System for Evaluation of Risk and Readiness of Cyber Security

Development of Information System for Evaluation of Risk and Readiness of Cyber Security Development of Information System for Evaluation of Risk and Readiness of Cyber Security Wiparat Pathakkhinang Siam Technology College, Thailand wiparatkataa@yahoo.com Assoc. Prof. Dr. Prasong Praneetpolgrang

More information